Главная
Study mode:
on
1
Intro
2
What is MFA
3
History of MFA
4
Authentication factors
5
Deployment modules
6
Something you are
7
Benefits
8
Challenges
9
Meet Dave
10
Securing Dave
11
Security Incidents
12
POC
13
Bypassing SPAM filters
14
Check compatibility
Description:
Explore a comprehensive conference talk from DefCamp 2018 that delves into the intricacies of Multi-Factor Authentication (MFA) and its potential vulnerabilities. Learn about the history, deployment modules, and authentication factors of MFA, as well as its benefits and challenges. Follow the journey of a fictional character, Dave, to understand real-world MFA implementation and security incidents. Gain insights into proof-of-concept techniques for bypassing SPAM filters and checking compatibility. This 43-minute presentation, part of the prestigious DefCamp conference series on Hacking & Information Security in Central and Eastern Europe, offers valuable knowledge for decision-makers, security specialists, entrepreneurs, and developers alike.

Trust, but Verify – Bypassing MFA – DefCamp – 2018

DefCamp
Add to list
0:00 / 0:00